Read Unit 7.
Part 1.
Select one of the sections in Unit 7 and research one of the main points. Write at least 2 paragraphs on the point.
Part 2.
Answer the following questions. Please use complete sentences and proper grammar when answering questions. Answers should be longer than 2 sentences. Completely answer each question. When answering, indicate the number/topic of the question.
- What are three methods for restricted unauthorized access to computer systems and/or files? Briefly explain each method
- Malware, viruses and trojans are all dangerous to computers and files. Briefly explain each type and describe any differences between how each form acts and how it can affect computer operations.
- What is social engineering?
- Spam, Phishing, Pharming – what are they and what do they do?
- On page 514, complete the Globalization questions. Answer all the questions provided in the paragraph. The paragraph attached:
“Because the Intemet connects computers all over the globe, you might expect that malware and black hat exploits would be evenly spread among countries. That is far from the case. Search online for statistics about malware Incidents by country. Which countries are hardest hit by malware? Also, examine the other side of the issue to gather statistics about which countries are the source of most malware attacks.”
Textbook Required:
Title: New Perspectives on Computer Concepts 2018, Introductory
Author: June Jamrich Parsons
Publisher: Cengage Learning
Year Published: 2017
Edition: 19th
ISBN: 10: or 13: 978-1-305-95151-8


0 comments